First published: Mon Oct 28 2024(Updated: )
LyLme Spage 1.2.0 through 1.6.0 is vulnerable to SQL Injection via /admin/apply.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
LyLme Spage | >=1.2.0<=1.6.0 | |
LyLme Spage | >=1.2.0<=1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48357 is classified as a high severity vulnerability due to its potential to allow SQL Injection attacks.
To fix CVE-2024-48357, update LyLme Spage to version 1.6.1 or later, which patches the SQL Injection vulnerability.
CVE-2024-48357 specifically targets the /admin/apply.php endpoint in LyLme Spage versions 1.2.0 through 1.6.0.
CVE-2024-48357 can lead to unauthorized data access, data manipulation, and possible remote code execution through SQL Injection.
As of now, there are no reported widespread exploits for CVE-2024-48357, but it remains a serious concern for users of affected versions.